Step 1: Trigger the Vulnerability: An attacker crafts a malicious request or repeatedly invokes the passwd command. The exact nature of the request is unknown from the CVE description, but it likely involves a specific input or sequence of actions that triggers the vulnerability.
Step 2: Resource Exhaustion: The crafted request causes the passwd command to consume excessive system resources, such as CPU cycles, memory, or file descriptors.
Step 3: System Degradation: As resources are exhausted, the system's performance degrades. Legitimate users may experience slow response times or be unable to log in.
Step 4: Denial of Service: Eventually, the system becomes unresponsive, leading to a denial of service. The system may crash or become unusable until the passwd process is terminated or the system is rebooted.